城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.139.217.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;11.139.217.254. IN A
;; AUTHORITY SECTION:
. 365 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020031000 1800 900 604800 86400
;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 15:19:17 CST 2020
;; MSG SIZE rcvd: 118
Host 254.217.139.11.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 254.217.139.11.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
134.175.111.215 | attack | Aug 16 09:59:45 tdfoods sshd\[8249\]: Invalid user minecraftserver from 134.175.111.215 Aug 16 09:59:45 tdfoods sshd\[8249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 Aug 16 09:59:47 tdfoods sshd\[8249\]: Failed password for invalid user minecraftserver from 134.175.111.215 port 46906 ssh2 Aug 16 10:04:55 tdfoods sshd\[8788\]: Invalid user charles from 134.175.111.215 Aug 16 10:04:55 tdfoods sshd\[8788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.111.215 |
2019-08-17 05:44:05 |
178.62.231.45 | attackbotsspam | 2019-08-16T19:34:05.705887abusebot-6.cloudsearch.cf sshd\[7840\]: Invalid user mysql from 178.62.231.45 port 41366 |
2019-08-17 04:00:40 |
105.228.232.220 | attackbotsspam | Aug 16 16:14:13 system,error,critical: login failure for user admin from 105.228.232.220 via telnet Aug 16 16:14:15 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:17 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:22 system,error,critical: login failure for user admin from 105.228.232.220 via telnet Aug 16 16:14:24 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:26 system,error,critical: login failure for user root from 105.228.232.220 via telnet Aug 16 16:14:31 system,error,critical: login failure for user admin from 105.228.232.220 via telnet Aug 16 16:14:33 system,error,critical: login failure for user Admin from 105.228.232.220 via telnet Aug 16 16:14:35 system,error,critical: login failure for user admin1 from 105.228.232.220 via telnet Aug 16 16:14:40 system,error,critical: login failure for user root from 105.228.232.220 via telnet |
2019-08-17 03:51:28 |
35.187.30.174 | attackbotsspam | Aug 16 10:38:55 GIZ-Server-02 sshd[10021]: Invalid user alex from 35.187.30.174 Aug 16 10:38:58 GIZ-Server-02 sshd[10021]: Failed password for invalid user alex from 35.187.30.174 port 38902 ssh2 Aug 16 10:38:58 GIZ-Server-02 sshd[10021]: Received disconnect from 35.187.30.174: 11: Bye Bye [preauth] Aug 16 10:47:21 GIZ-Server-02 sshd[19425]: Invalid user m5ping from 35.187.30.174 Aug 16 10:47:23 GIZ-Server-02 sshd[19425]: Failed password for invalid user m5ping from 35.187.30.174 port 34908 ssh2 Aug 16 10:47:23 GIZ-Server-02 sshd[19425]: Received disconnect from 35.187.30.174: 11: Bye Bye [preauth] Aug 16 10:52:05 GIZ-Server-02 sshd[24334]: Invalid user coleen from 35.187.30.174 Aug 16 10:52:07 GIZ-Server-02 sshd[24334]: Failed password for invalid user coleen from 35.187.30.174 port 56622 ssh2 Aug 16 10:52:07 GIZ-Server-02 sshd[24334]: Received disconnect from 35.187.30.174: 11: Bye Bye [preauth] Aug 16 10:56:44 GIZ-Server-02 sshd[29762]: Invalid user er from 35.187.30........ ------------------------------- |
2019-08-17 03:44:09 |
112.166.68.193 | attack | Aug 16 09:59:27 eddieflores sshd\[6249\]: Invalid user eco from 112.166.68.193 Aug 16 09:59:27 eddieflores sshd\[6249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.68.193 Aug 16 09:59:28 eddieflores sshd\[6249\]: Failed password for invalid user eco from 112.166.68.193 port 35484 ssh2 Aug 16 10:04:51 eddieflores sshd\[6668\]: Invalid user matrix from 112.166.68.193 Aug 16 10:04:51 eddieflores sshd\[6668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.68.193 |
2019-08-17 05:45:22 |
89.248.168.107 | attackspam | Aug 16 21:19:47 h2177944 kernel: \[4306885.191305\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=57478 PROTO=TCP SPT=44855 DPT=11491 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:20:37 h2177944 kernel: \[4306935.048295\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=56767 PROTO=TCP SPT=44844 DPT=11313 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:26:22 h2177944 kernel: \[4307279.659395\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=52452 PROTO=TCP SPT=44844 DPT=11363 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:26:35 h2177944 kernel: \[4307292.597250\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=27751 PROTO=TCP SPT=44909 DPT=11953 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 16 21:26:41 h2177944 kernel: \[4307298.539491\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85. |
2019-08-17 04:04:49 |
103.3.226.228 | attackspam | Aug 16 09:41:22 hiderm sshd\[540\]: Invalid user erp from 103.3.226.228 Aug 16 09:41:22 hiderm sshd\[540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.228 Aug 16 09:41:24 hiderm sshd\[540\]: Failed password for invalid user erp from 103.3.226.228 port 45812 ssh2 Aug 16 09:47:03 hiderm sshd\[1072\]: Invalid user mihai from 103.3.226.228 Aug 16 09:47:03 hiderm sshd\[1072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.228 |
2019-08-17 03:58:13 |
211.210.13.201 | attackspambots | Aug 16 22:04:49 ncomp sshd[6584]: Invalid user postgres from 211.210.13.201 Aug 16 22:04:49 ncomp sshd[6584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.13.201 Aug 16 22:04:49 ncomp sshd[6584]: Invalid user postgres from 211.210.13.201 Aug 16 22:04:51 ncomp sshd[6584]: Failed password for invalid user postgres from 211.210.13.201 port 59532 ssh2 |
2019-08-17 05:44:27 |
185.100.85.132 | attackspam | Invalid user admin from 185.100.85.132 port 58643 |
2019-08-17 03:54:28 |
64.113.32.29 | attackbotsspam | Aug 16 20:19:11 web2 sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.113.32.29 Aug 16 20:19:13 web2 sshd[18238]: Failed password for invalid user 666666 from 64.113.32.29 port 33962 ssh2 |
2019-08-17 03:32:30 |
66.240.192.138 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-08-17 03:41:03 |
206.189.212.81 | attackbotsspam | Aug 16 09:28:08 eddieflores sshd\[3833\]: Invalid user archiva from 206.189.212.81 Aug 16 09:28:08 eddieflores sshd\[3833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.212.81 Aug 16 09:28:09 eddieflores sshd\[3833\]: Failed password for invalid user archiva from 206.189.212.81 port 33038 ssh2 Aug 16 09:32:46 eddieflores sshd\[4159\]: Invalid user steam from 206.189.212.81 Aug 16 09:32:46 eddieflores sshd\[4159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.212.81 |
2019-08-17 03:33:39 |
120.156.34.73 | attack | Honeypot attack, port: 23, PTR: cpe-120-156-34-73.qb04.qld.asp.telstra.net. |
2019-08-17 03:43:33 |
134.209.99.27 | attackbotsspam | Aug 16 11:08:50 xb0 sshd[4009]: Failed password for invalid user pcgo-admin from 134.209.99.27 port 46000 ssh2 Aug 16 11:08:50 xb0 sshd[4009]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:09:14 xb0 sshd[4677]: Failed password for invalid user pcgo-admin from 134.209.99.27 port 53920 ssh2 Aug 16 11:09:14 xb0 sshd[4677]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:24:04 xb0 sshd[5108]: Failed password for invalid user hydra from 134.209.99.27 port 37798 ssh2 Aug 16 11:24:04 xb0 sshd[5108]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:24:11 xb0 sshd[7800]: Failed password for invalid user hydra from 134.209.99.27 port 43456 ssh2 Aug 16 11:24:11 xb0 sshd[7800]: Received disconnect from 134.209.99.27: 11: Bye Bye [preauth] Aug 16 11:29:07 xb0 sshd[6544]: Failed password for invalid user yamamoto from 134.209.99.27 port 58964 ssh2 Aug 16 11:29:07 xb0 sshd[6544]: Received disconnect from 134.209......... ------------------------------- |
2019-08-17 03:47:16 |
71.235.15.41 | attackspambots | Honeypot attack, port: 23, PTR: c-71-235-15-41.hsd1.nh.comcast.net. |
2019-08-17 03:41:49 |